Branch Coverage

inc/CryptX_Cipher.xs.inc
Criterion Covered Total %
branch 69 144 47.9


line true false branch
22 0 3689 if (idx + 1 > items) croak("FATAL: missing argument");
24 3689 0 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
3 3686 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
3 0 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
1 2 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
0 1 if (!SvPOK_spec(name_sv)) croak("FATAL: invalid cipher name");
26 0 3687 if (idx + 2 > items) croak("FATAL: missing key argument");
28 1134 2553 if (idx + 3 <= items) rounds = (int)SvIV(ST(idx + 2));
30 3687 0 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
1 3686 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
1 0 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
1 0 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
0 1 if (!SvPOK_spec(key)) croak("FATAL: key must be string/buffer scalar");
34 1 3686 if (id == -1) croak("FATAL: find_cipher failed for '%s'", cipher_name);
37 0 3686 if (!RETVAL) croak("FATAL: Newz failed");
41 0 3686 if (rv != CRYPT_OK) {
65 122713 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 122713 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
68 1 122712 if (len == 0) {
71 122712 0 else if (len == (STRLEN)self->desc->block_length) {
76 0 122712 if (rv!=CRYPT_OK) {
96 689 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 689 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
0 0 if (!SvPOK_spec(data)) XSRETURN_UNDEF;
99 1 688 if (len == 0) {
102 688 0 else if (len == (STRLEN)self->desc->block_length) {
107 0 688 if (rv!=CRYPT_OK) {
123 27 200 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
27 0 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
130 200 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 200 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
134 66 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
132 0 200 if (id == -1) croak("FATAL: find_cipher failed for '%s'", name);
134 0 200 if (!rv) croak("FATAL: invalid block_length for '%s'", name);
145 52 271 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
52 0 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
152 271 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 271 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
219 52 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
154 0 271 if (id == -1) croak("FATAL: find_cipher failed for '%s'", name);
156 0 271 if (!rv) croak("FATAL: invalid max_key_length for '%s'", name);
167 26 133 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
26 0 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
174 133 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 133 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
107 26 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
176 0 133 if (id == -1) croak("FATAL: find_cipher failed for '%s'", name);
178 0 133 if (!rv) croak("FATAL: invalid min_key_length for '%s'", name);
189 26 130 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
26 0 if (sv_isobject(param) && sv_derived_from(param, "Crypt::Cipher")) {
196 130 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 130 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
0 0 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
104 26 char *name = SvPOK_spec(param) && strcmp(SvPVbyte(param, plen), "Crypt::Cipher") ? SvPVbyte(param, plen) : extra;
198 0 130 if (id == -1) croak("FATAL: find_cipher failed for '%s'", name);
200 0 130 if (!rv) XSRETURN_UNDEF;